• Corpus ID: 5061506

Physical Layer Security in Massive MIMO

  title={Physical Layer Security in Massive MIMO},
  author={Yuksel Ozan Basciftci and Can Emre Koksal and Alexei E. Ashikhmin},
  journal={arXiv: Information Theory},
We consider a single-cell downlink massive MIMO communication in the presence of an adversary capable of jamming and eavesdropping simultaneously. We show that massive MIMO communication is naturally resilient to no training-phase jamming attack in which the adversary jams only the data communication and eavesdrops both the data communication and the training. Specifically, we show that the secure degrees of freedom (DoF) attained in the presence of such an attack is identical to the maximum… 

Figures from this paper

Vulnerabilities of Massive MIMO Systems Against Pilot Contamination Attacks

This work demonstrates the vulnerability of CSI estimation phase to malicious attacks, and analyzes the achievable individual secrecy rates under a pilot contamination attack, and provides an upper bound on these rates.

Secure Massive MIMO Transmission With an Active Eavesdropper

This paper considers a time-division duplex system where uplink training is required and an active eavesdropper can attack the training phase to cause pilot contamination at the transmitter, and derives an asymptotic achievable secrecy rate when the number of transmit antennas approaches infinity.

Vulnerabilities of Massive MIMO Systems to Pilot Contamination Attacks

The vulnerability of the CSI estimation process to pilot-contamination attacks, a single-cell massive multiple-input multiple-output (MIMO) system in which a base station with a large number of antennas transmits simultaneously to several single-antenna users, is demonstrated.

Original Symbol Phase Rotated Secure Transmission Against Powerful Massive MIMO Eavesdropper

It is shown that when the BS has a large enough, but finite number of antennas, the proposed OSPR scheme can achieve a considerable security performance in that the eavesdropper is unable to recover most of the original symbols, even with unlimited antennas.

Pilot Spoofing Attack by Multiple Eavesdroppers

An efficient algorithm based on the minorization–maximization (MM) method and the alternating direction method of multipliers (ADMM) to solve wiretapping SNR maximization problems is proposed and is shown to converge to a stationary point of the general problem.

Securing Uplink Transmission for Lightweight Single-Antenna UEs in the Presence of a Massive MIMO Eavesdropper

It is shown that the UOSPR scheme is with low complexity from the perspective of the lightweight UEs, which potentially makes it a candidate uplink secure transmission scheme in IoT and 5G scenarios.

Design and Performance Analysis of Channel Estimators Under Pilot Spoofing Attacks in Multiple-Antenna Systems

It is analytically demonstrated that the spoofing effects in the high signal-to-noise ratio regime can be completely suppressed, under certain conditions involving the AoAs of the legitimate and spoofing channels.

Random-Training-Assisted Pilot Spoofing Detection and Security Enhancement

A novel random-training-assisted (RTA) pilot spoofing detection algorithm that can achieve efficient pilot spoofed detection in all cases and its performance is superior to other state-of-the-art detectors.

Beyond PKI: Enhanced Authentication in Vehicular Networks via MIMO

This project presents the dual use of a multi-antenna roadside unit (RSU) as a radar as well as a wireless transceiver to mitigate the potential risk of location spoofing/falsifying attack.

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

This paper provides a latest survey of the physical layer security research on various promising 5G technologies, includingPhysical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, and so on.



Secure Transmission in Multicell Massive MIMO Systems

This paper considers secure downlink transmission in a multicell massive MIMO system with matched-filter precoding and artificial noise (AN) generation at the base station (BS) in the presence of a passive multiantenna eavesdropper, and considers two different AN shaping matrices.

The Secrecy Capacity of the MIMO Wiretap Channel

This paper compute the perfect secrecy capacity of the multiple antenna MIMO broadcast channel, where the number of antennas is arbitrary for both the transmitter and the two receivers.

On the Secrecy Capacity of Block Fading Channels With a Hybrid Adversary

We consider a block fading wiretap channel, where a transmitter attempts to send messages securely to a receiver in the presence of a hybrid half-duplex adversary, which arbitrarily decides to either

A Unified Framework for Key Agreement Over Wireless Fading Channels

A joint source-channel approach that combines existing source and channel models for key agreement over wireless fading channels is developed and the attacker's optimal attack strategy is identified and the key rate under this attack model is characterized.

How much training is needed in multiple-antenna wireless links?

This work compute a lower bound on the capacity of a channel that is learned by training, and maximize the bound as a function of the received signal-to-noise ratio (SNR), fading coherence time, and number of transmitter antennas.

Energy and Spectral Efficiency of Very Large Multiuser MIMO Systems

It is shown that the use of moderately large antenna arrays can improve the spectral and energy efficiency with orders of magnitude compared to a single-antenna system.

How Much Training is Required for Multiuser Mimo?

  • T. Marzetta
  • Business
    2006 Fortieth Asilomar Conference on Signals, Systems and Computers
  • 2006
An M-element antenna array (the base station) transmits, on the downlink, K les M sequences of QAM symbols selectively and simultaneously to K autonomous single-antenna terminals through a linear

The wire-tap channel

  • A. Wyner
  • Computer Science
    The Bell System Technical Journal
  • 1975
This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.

Noncooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas

  • T. Marzetta
  • Business
    IEEE Transactions on Wireless Communications
  • 2010
A cellular base station serves a multiplicity of single-antenna terminals over the same time-frequency interval and a complete multi-cellular analysis yields a number of mathematically exact conclusions and points to a desirable direction towards which cellular wireless could evolve.

Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels

Using the theory of reciprocity for antennas and electromagnetic propagation, a key distribution method is proposed that uses the ultrawideband channel pulse response between two transceivers as a source of common randomness that is not available to enemy observers in other locations.